Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


what is the difference between encryption and hashing?



what is the difference between encryption and hashing?..

Answer / awanindra

Both are methods to hide the original contents of data in
some unrecognizable format.
But Encryption is Reversible Process while hashing is
irreversible process. It means Encrypted data can be
Decrypted to get the original data using encryption key but
hashed data cannot be retrieved since there will be no key
used in hashing.

Is This Answer Correct ?    18 Yes 1 No

Post New Answer

More Encryption Decryption Interview Questions

How to change the location of the Kryptel (Silver Key) program group?

0 Answers  


What is the mceliece cryptosystem?

0 Answers  


What are the advantages of public-key cryptography compared with secret-key cryptography?

0 Answers  


How should I store my private key ?

0 Answers   TCS,


What is luc?

0 Answers  


What is meant by 1024, 2048, 5096 bit encryption?

0 Answers   ASD Lab,


How do certifying authorities store their private keys ?

0 Answers  


What is the Popular Symmetric-Key Encryption Method

0 Answers   HCL,


Hello. In Snort, how a digital signature is actually created for the authentication purpose and thereby provides intrusion detection as well as prevention. How the software for IDS/IPS comes to know regarding the threat/vulnerability using digital signature ? Whether any specific language or programming is used or not.

1 Answers  


What happens if a private key is compromised ?

1 Answers  


Can the computer which has been used for encryption be traced?

4 Answers   Amazon, NetApp,


What is Ciphertext?

5 Answers  


Categories
  • Cryptography Algorithms Interview Questions Cryptography Algorithms (52)
  • Digital Certificates Interview Questions Digital Certificates (23)
  • Encryption Decryption Interview Questions Encryption Decryption (77)
  • Ciphers Interview Questions Ciphers (43)
  • Cryptography Protocols Interview Questions Cryptography Protocols (31)
  • Blockchain Interview Questions Blockchain (338)
  • Cryptography General Interview Questions Cryptography General (154)
  • Cryptography AllOther Interview Questions Cryptography AllOther (0)